Infosecurity Opinions

  1. It’s Time to Stop Accepting Losses in Cybersecurity

    John Kindervag argues that we should shift from risk management to danger management in cybersecurity

    1. Photo of John Kindervag

      John Kindervag

      Creator of Zero Trust and Chief Evangelist Officer at Illumio

  2. Rethinking Resilience for the Age of AI-Driven Cybercrime

    Dan Lohrmann explains why next era of cyber resilience demands a proactive mindset that fuses AI-powered defense, identity-first security and operational agility

    1. Photo of Dan Lohrmann

      Dan Lohrmann

      Field CISO, Presidio

  3. Closing the Cybersecurity Skills Gap: A New Perspective on Career Paths

    Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age

    1. Photo of Keatron Evans

      Keatron Evans

      Cybersecurity and Workforce Development Expert, Infosec Institute

  4. Challenges Facing the UK Government’s Proposed Ransomware Ban

    Andrew Rose discusses issues and pitfalls around the UK government's proposed ransomware payment ban

    1. Photo of Andrew Rose

      Andrew Rose

      CSO, SoSafe

  5. How Security Professionals Can Prepare for the CISO Role

    ISACA's Sushila Nair explains the different skills security professionals need to learn during their careers to prepare for leadership positions

    1. Photo of Sushila Nair

      Sushila Nair

      CEO, Cybernetic LLC

  6. Preparing for the Realities of a Ransomware Confrontation

    Raj Samani advises on how to prepare for the reality of facing a ransomware demand

    1. Photo of Raj Samani

      Raj Samani

      SVP, Chief Scientist, Rapid7

  7. Combating the Invisible Threat of In-Memory Cyber-Attacks

    Brad LaPorte discusses the growing trend of in memory, runtime-based attacks, which are exceptionally difficult for defenders to detect

    1. Photo of Brad LaPorte

      Brad LaPorte

      CMO, Morphisec and former Gartner Analyst

  8. From Legacy Systems to 5G: Enterprise Security Threats in 2025

    The GSMA's Sam Knight sets out the ways attackers are targeting expanding attack surfaces

    1. Photo of Samantha Kight

      Samantha Kight

      Head of Security Industry, GSMA

  9. Incident Management: How to Ensure Your Organization Can Handle a Crisis

    TD Bank's Gaya Ratnam discusses how organizations can improve their incident management amid surging cyber attacks

    1. Gaya Ratnam

      Manager, Enterprise Technology Risk Management, TD Bank

  10. Zero Trust Must be a Cybersecurity Priority for the Trump Administration

    To safeguard US systems against threat actors like Salt Typhoon, Trump Should Double Down on Biden’s Zero Trust Initiatives

    1. Photo of Niranjan Shankar

      Niranjan Shankar

      Senior Software Engineer, Microsoft

  11. Third-Party Cyber Risk Management: Taking a Strategic Approach

    Travelers' Jaime Palumbo discusses the third-party cyber risk landscape, and actions organizations need to take to address this threat

    1. Photo of Jaime Palumbo

      Jaime Palumbo

      Cyber Managing Director & Counsel, Travelers

  12. Full Exposure: A Practical Approach to Handling Sensitive Data Leaks

    GitHub's CISO Alexis Wales argues that organizations should embrace the assumption of full exposure when responding to accidental data leaks

    1. Photo of Alexis Wales

      Alexis Wales

      CISO, GitHub

  13. Data Privacy Week: What Apple’s Wiretap Settlement Means for the Future of Privacy

    Polina Arsentyeva discusses the impact of Apple’s recently settled lawsuit relating to Siri recordings on consumer privacy

    1. Photo of Polina Arsentyeva

      Polina Arsentyeva

      Privacy, Data & Product Counsel, Brightcove Inc.

  14. Data Privacy Week: How Privacy Pros Are Navigating the Gordian Knot of Digital Law

    IAPP experts discuss how privacy professionals are meeting the challenge of navigating expanding and overlapping digital law and policy

    1. Photo of Joe  Jones

      Joe Jones

      Director of Research and Insights, International Association of Privacy Professionals (IAPP)

    2. Photo of Cheryl  Saniuk-Heinig

      Cheryl Saniuk-Heinig

      Analyst, International Association of Privacy Professionals (IAPP)

  15. Data Privacy Week: EU Commission Data Transfer Case Has Implications for US Businesses

    Victoria Akosile says US firms that transfer data from the EU need to take notice of a recent Court ruling over EU Commission practices

    1. Photo of Victoria Akosile

      Victoria Akosile

      Deputy Director, Privacy Operations, BBB National Programs

  16. Quantum Computers Are Coming for Your Crypto Keys, But Not Yet

    IBS Software’s Alex Haynes says there is still a long way to go before quantum computers are able to break modern cryptographic keys

    1. Photo of Alex Haynes

      Alex Haynes

      CISO, IBS Software

  17. Learning from 2024: An Unprecedented Exploitation of Remote Access Technologies

    Paolo Passeri discusses the unprecedented number of exploitation of remote access technologies in 2024, and how organizations can boost their security against such incidents

    1. Photo of Paolo Passeri

      Paolo Passeri

      Cyber Intelligence Principal, Netskope

  18. Top CISO Focuses for Navigating Cybersecurity in 2025

    PA Consulting experts say that data governance and securing AI should be among the key focuses for CISOs in 2025

    1. Photo of Laura Hawkins

      Laura Hawkins

      Digital Trust Specialist, PA Consulting

    2. Photo of Elliot Rose

      Elliot Rose

      Cyber Security Expert, PA Consulting

  19. 2025: A Critical Year for Cybersecurity Compliance in the EU and UK

    Lawyers from Clifford Chance highlight the cybersecurity legislative updates in 2024 that EU and UK businesses must be prepared for

    1. Photo of Patrice Navarro

      Patrice Navarro

      Partner, Clifford Chance

    2. Photo of Oscar  Tang

      Oscar Tang

      Senior Associate, Clifford Chance

  20. 2025 to be a Year of Reckoning for AI in Cybersecurity

    Kevin Curran says 2025 will be a year of reckoning for AI in cybersecurity as people improve their understanding of the technology

    1. Photo of Professor Kevin  Curran

      Professor Kevin Curran

      Senior IEEE Member and Professor of Cybersecurity, Ulster University.

What’s hot on Infosecurity Magazine?